remember me Forgot your password?
Sign in    Registration                 We’re creating the largest and most complete database of photographic lenses in the world! Join us!
All About Photographic Lenses.
Specifications, comparison, reviews,
MTF-charts for lenses by Canon,
Nikon, Sony, Pentax, Olympus,
Sigma, Tamron, Carl Zeiss, etc.


Do you like a good instrumental music?
Listen to new beautiful music from composer Sergei Borodin. Click HERE...

How to Protect Internet Connection?

jammershopers :: 26.08.2022 06:35:23

lvl. 1 (Lens-Learner)

With the development of the mobile GSM network, the mobile Internet is also growing. We are used to the normal internet, based on the TCP/IP protocol, but how does the mobile internet work

In order to connect to a mobile internet network, your smartphone only needs to "know" three parameters, which are: APN, login and password. An APN is an access point that a specific user uses to obtain a desired service, such as WAP, MMS, or the Internet. The whole connection process is divided into two steps:

1. GPRS Attach;

2. The PDP context is activated.

During the first stage (GPRS connection) your smartphone or table, it doesn't matter that it starts communicating with your operator's network. Your smartphone must then be authorized with the following parameters: IMSI (International Mobile Subscriber Identity) and IMEI – to identify your device. Note that the IMEI is also checked against the list of stolen IMEIs at this time, and if someone who stole your phone will try to access the internet - the police will be notified.

So, you're authorized in the network, it's time to go to step 2. Well, PDP context activation is the process of creating a network tunnel between the smartphone, the gateway and the carrier network. After that, you can access the network. But be careful, the mobile internet is more dangerous than the traditional internet. The website may also collect your personal data.

Be aware that there is no real TCP/IP protocol in the mobile internet, all data is transmitted via the GTP protocol, which is also used for server-to-server communication in cellular networks. There are several types of GTP protocols: GTP-U - for transferring data, GTP-C for control sessions and GTP` (GTP Prime) - for transferring billing information. This protocol is the weakest link of the entire system, as the data is not encrypted and does not require any authentication.

This enables hackers to cut into the session and intercept packets. You only need to know the GGSN (Gateway Service Node) identifier. But that's not a problem either - if you type GGSN into Shodan - you'll get a lot.

The damage that the vulnerability could cause is obvious and potentially significant. Many people consider the mobile internet to be as secure as their home connection, and don't hesitate to send personal data, sometimes very valuable data, over it. A large percentage of users access their bank accounts via their smartphones, but it's dangerous - just check the rules for secure mobile banking.

So what can we do to ensure our personal information is safe, even within the carrier's network? First, it's wise to avoid sending sensitive data in this unreliable way. Keep your antivirus application updated as many malicious applications access the network and can endanger you. Also, wireless wifi bluetooth jammer can be useful as you may never know if your smartphone is infected. A wireless wifi signal jammer can help you avoid these problems

Related Articles

How to use wifi jammer?

What's preventing you from getting your work done efficiently?

How to Avoid Hacking?

> Here you can find your own jammer

Back to top page

You must be logged in to add a message